Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • What is Asset Discovery? A Look Beneath the Surface
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

What is Asset Discovery? A Look Beneath the Surface

5 years ago Matthew Jerzewski
What is Asset Discovery? A Look Beneath the Surface

The corporate network can be a busy place with devices connecting, reconnecting and disconnecting every day. With the ever-growing landscape of today’s corporate networks, the difficulty of knowing and understanding what is on an enterprise network has highlighted the importance of effective asset discovery. So what does asset discovery involve? Asset discovery involves keeping a check on the active and inactive assets on a network. For many modern corporations, this will now include cloud, virtual, and mobile devices in addition to the traditional on-premise workstations and servers. This can start to make gathering insight into devices more difficult.

Trust the Process

2020 brought about a paradigm shift in how business conduct day to day operations. Dispersed corporate networks which extend onto the cloud and into employee homes can inevitably lead to blind spots, which may allow attackers to exploit weak points in a network. IT personnel can get visibility into these blind spots by leveraging a high-quality asset discovery tool.

Strong foundational IT security is crucial, the Center of Internet Security (CIS) believes so as well by encompassing the first two Critical Security Controls (CSC) for asset management.  

  • CIS CSC 1: Actively manage (inventory, track, and correct) all hardware devices on the network so that only authorized devices are given access, and unauthorized and unmanaged devices are found and prevented from gaining access.
  • CIS CSC 2: Actively manage (inventory, track, and correct) all software on the network so that only authorized software is installed and can execute, and that unauthorized and unmanaged software is found and prevented from installation or execution.

Improved Network Visibility

Achieving 100% network visibility can be an overwhelming task, but it’s not impossible and the best run corporate networks strive to achieve or maintain this noble goal. To shed light throughout every corner of your organization’s network you wouldn’t try to do this all by hand, would you? I should hope not!

Investing instead in automated solutions that can perform asset discovery and apply best practices detailed reporting of what is on your network is highly recommended. An asset discovery tool may use active or passive techniques to collect data from a variety of sources and use it to enumerate hosts that could be connected to the network.

After analyzing the resources that have been found on the network, the asset discovery tool may gather more details about those hosts such as: configuration, connection logs, maintenance schedules, software installations, and usage. Having this level of visibility can benefit an organization in many ways such as:

  • Threat Management
  • Bandwidth Tracking
  • Identifying Unauthorized Use
  • Reducing Downtime

Using the more accurate data harvested from an asset discovery tool, an organization can then start to map assets to relevant information such as owner, location, contracts and projects that are associated with said assets. Having IT assets mapped will give an organization more fleshed-out asset reports that contain insights into security risks and overall asset operational costs, thus allowing those operational costs to be tied back to specific projects giving the organization more field of view. 

Tripwire Asset Discovery Tools

Tripwire offers extensive asset discovery capabilities with the Tripwire Asset Discovery Appliance. This solution works by discovering all networked hosts, applications and services. Asset Discovery Appliance empowers users by providing a comprehensive mapping of devices and software on your network. An organization then has the foundation for effective security configuration management and compliance processes.

Additionally, if their organization uses Tripwire Enterprise (TE), our TE product can not only perform real-time detection and conduct deep system visibility, but also reduce attack surface and risk exposure with proper system hardening and continuous configuration monitoring.

As one of the first recommended foundational controls, asset discovery is one of the most important and basic foundational practices that organizations should be looking at when coming up with a plan to manage their underlying assets and creating a more secure network ecosystem.

The post ” What is Asset Discovery? A Look Beneath the Surface” appeared first on TripWire

Source:TripWire – Matthew Jerzewski

Tags: Cloud, Critical Severity, Exploit, High Severity, TripWire

Continue Reading

Previous Microsoft Issues Emergency Patch for Critical Windows PrintNightmare Vulnerability
Next Vulnerability Scanning vs. Penetration Testing

More Stories

  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

1 hour ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Data Breach
  • Vulnerabilities

Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries

4 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack

16 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories

21 hours ago [email protected] (The Hacker News)
  • Data Breach

The Buyer’s Guide to AI Usage Control

22 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Infy Hackers Resume Operations with New C2 Servers After Iran Internet Blackout Ends

23 hours ago [email protected] (The Hacker News)

Recent Posts

  • Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware
  • Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries
  • AISURU/Kimwolf Botnet Launches Record-Setting 31.4 Tbps DDoS Attack
  • ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories
  • The Buyer’s Guide to AI Usage Control

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT